This dashboard tracks my progress across the SY0-701 exam objectives. Each objective links to a dedicated notes page and carries a simple status badge.

4 Done
0 In progress
0 Review
24 Pending
28 Total

14% complete — 4 of 28 objectives

1.0 General Security Concepts (12%)

Objective Title Status Link Official
1.1 Compare and contrast various types of security controls. done View notes Official PDF PDF p.4
1.2 Summarize fundamental security concepts. done View notes Official PDF PDF p.4
1.3 Explain the importance of change management processes and the impact to security. done View notes Official PDF PDF p.5
1.4 Explain the importance of using appropriate cryptographic solutions. done View notes Official PDF PDF p.5

2.0 Threats, Vulnerabilities, and Mitigations (22%)

Objective Title Status Link Official
2.1 Compare and contrast common threat actors and motivations. pending View notes Official PDF PDF p.6
2.2 Explain common threat vectors and attack surfaces. pending View notes Official PDF PDF p.6
2.3 Explain various types of vulnerabilities. pending View notes Official PDF PDF p.7
2.4 Given a scenario, analyze indicators of malicious activity. pending View notes Official PDF PDF p.7
2.5 Explain the purpose of mitigation techniques used to secure the enterprise. pending View notes Official PDF PDF p.7

3.0 Security Architecture (18%)

Objective Title Status Link Official
3.1 Compare and contrast security implications of different architecture models. pending View notes Official PDF PDF p.8
3.2 Given a scenario, apply security principles to secure enterprise infrastructure. pending View notes Official PDF PDF p.8
3.3 Compare and contrast concepts and strategies to protect data. pending View notes Official PDF PDF p.9
3.4 Explain the importance of resilience and recovery in security architecture. pending View notes Official PDF PDF p.9

4.0 Security Operations (28%)

Objective Title Status Link Official
4.1 Given a scenario, apply common security techniques to computing resources. pending View notes Official PDF PDF p.10
4.2 Explain the security implications of proper hardware, software, and data asset management. pending View notes Official PDF PDF p.10
4.3 Explain various activities associated with vulnerability management. pending View notes Official PDF PDF p.11
4.4 Explain security alerting and monitoring concepts and tools. pending View notes Official PDF PDF p.11
4.5 Given a scenario, modify enterprise capabilities to enhance security. pending View notes Official PDF PDF p.12
4.6 Given a scenario, implement and maintain identity and access management. pending View notes Official PDF PDF p.12
4.7 Explain the importance of automation and orchestration related to secure operations. pending View notes Official PDF PDF p.13
4.8 Explain appropriate incident response activities. pending View notes Official PDF PDF p.13
4.9 Given a scenario, use data sources to support an investigation. pending View notes Official PDF PDF p.13

5.0 Security Program Management and Oversight (20%)

Objective Title Status Link Official
5.1 Summarize elements of effective security governance. pending View notes Official PDF PDF p.14
5.2 Explain elements of the risk management process. pending View notes Official PDF PDF p.14
5.3 Explain the processes associated with third-party risk assessment and management. pending View notes Official PDF PDF p.15
5.4 Summarize elements of effective security compliance. pending View notes Official PDF PDF p.15
5.5 Explain types and purposes of audits and assessments. pending View notes Official PDF PDF p.15
5.6 Given a scenario, implement security awareness practices. pending View notes Official PDF PDF p.16

Attribution: Exam objectives content © CompTIA. Source: SY0-701 Exam Objectives (v5.0).